The War on Cybercrime is Not Lost

“To see victory only when it is within the ken of the common herd is not the acme of excellence.” – Sun Tzu by Blake McConnell of Symantec There may not be physical battle lines drawn, but the current conflict between cybercriminals and businesses and governments is just as real and damaging as a war…

Cybercrime, Hiring, Broadband Investment All on the Rise

CIOs Reveal Q4 Hiring Plans Technology executives expect information technology (IT) hiring to continue in the fourth quarter of 2011, according to the just-released Robert Half Technology IT Hiring Index and Skills Report. In the latest quarterly survey, 12 percent of CIOs said they plan to expand their IT departments, and 6 percent expect cutbacks…

5 Tips for Managing the Data Breach Risk

Sensitive, personally identifiable information (PII) such as names, account numbers, trading and other financial information are collected and used for virtually every customer and internal corporate function: HR; marketing; sales; customer support; technical support; product development; investor relations; regulatory compliance … the list goes on. Companies also handle sensitive data related to intellectual property (IP)…

Inside the Cyber Threat Landscape

Today’s advanced cyber criminals are committed to stealing data, disrupting services and maintaining access to a target environment for as long as possible (enabling future intrusions). These threats apply to all industries, not just those that deal with credit cards or personal information. Companies that have proprietary data that is perceived to be of economic…

Stuxnet and the Future of Malware

Who was responsible for Stuxnet? This was a question I asked a number of security pros at the 2011 RSA security conference last month in San Francisco. The leading contenders were the obvious ones: the U.S. and Israel. However, a very good case was made (off the record, unfortunately) for a surprising dark horse: China….

Top 10 Smartphone Security Tips

When it comes to security issues, smartphone users are a bit delusional in believing the phone is safer than the PC. “If you can access data on your smartphone, so too can hackers,” warned Martin Hack, EVP of NCP engineering. What can thieves get from your phone? Access to your mobile banking site complete with…

Top 10 Technology Security Trends for 2011

PandaLabs, the anti-malware lab of Panda Security, put out their predictions for 2011 and, while some of it is more of the same, some metrics are actually improving — unless you count in Mac attacks (not the McDonalds’s kind), HTML5, information blackmail, 64-bit attacks … sigh. “The overall picture is not improving. Even though we…

The Safe Shopper’s Cyber Shopping Guide

Like lions laying in wait for the herd at the watering hole, cybercriminals are crouched and ready to spring on unwary shoppers queuing to buy online. This is not news to the cyber-savvy but even they can fall victim to the ever changing threat these criminals represent. Sure, the litany of “don’t click links in…